Army photo

ARLINGTON: Pop culture pictures hackers in clean, air-conditioned rooms, working global network magic from a desk. For the Army, though, that’s not enough. If American troops are to prevail against inventive foes in high-tech, close-quarters fights, the hacker elite have to get their boots muddy with the regular grunts. So now the Army’s sending cyber soldiers to… Keep reading →

Submarine launched cruise missile

WASHINGTON: Two years ago, Capt. John Zimmerman and his award-winning Navy team were testing a software upgrade for submarines when they ran into a surprising problem. When they changed the code controlling the Tomahawk missile launchers, the torpedo tubes stopped working. Fortunately, this all happened in a laboratory ashore before the upgrade got anywhere near the… Keep reading →

US Army cybersecurity personnel

ARLINGTON: “We needed to learn to speak infantry,” said Col. William Hartman, commander of the Army’s first offensive cyber operations brigade. That’s not easy. When one of Hartman’s teams joined a brigade of the 25th Infantry Division for an exercise this spring, the colonel recounted, the 25th’s commanding general told Hartman that his cyber operators… Keep reading →

US and Russian warships

WASHINGTON: “We are observing the manifestation of a more aggressive, more capable Russian navy,” the US Navy’s top commander in Europe said today. And if that fleet is Putin’s seagoing hammer, missile bases ashore are his land-based anvil. Complementing Russian naval modernization, Adm. Mark Ferguson said, we have seen “the construction of an arc of… Keep reading →


NATIONAL HARBOR: The Air Force vision is of a seamless global network, swiftly spotting threats and taking them down with smart bombs, computer viruses, or (one day) lasers as the situation demands. The reality? Not so seamless. Air Force Space Command, for example, houses both the military’s space operations center and a new cyber ops… Keep reading →

EC-130 Compass Call electronic warfare aircraft, used for an experimental cyber attack

NATIONAL HARBOR: Matthew Broderick in his basement, playing Wargames over a landline, is still the pop culture archetype of a hacker. But as wireless networks became the norm, new-age cyber warfare and traditional electronic warfare are starting to merge. Hackers can move out of the basement to the sky. In a series of experiments, the… Keep reading →

James Clapper

WASHINGTON: No one really knows what they’re doing in cyberspace: It’s all too new and it changes too fast. So it was refreshing — if unnerving — for two top intelligence officials to admit this morning that the US government’s lack of clarity makes it more difficult both to deter adversaries’ cyber operations and to conduct… Keep reading →

(U.S. Air Force photo by Jerry Saslav)

TYSON’S CORNER: “Unity of command” is a classic principle of war. As the US military struggles to improve cybersecurity against relentless Russian, Chinese, and other attacks, however, it’s finding the complex interconnectedness of computer networks complicate the chain of command. If the tech guys urgently need to shut a system down — say, because it’s… Keep reading →

DNI JAmes Clapper at NSS 2014

GEOINT: Director of National Intelligence James Clapper identified China today as “the leading suspect” in the two sweeping hacks of the Office of Personnel Management, one day after NSA Director Adm. Mike Rogers dodged the issue. In Clapper’s first answer to a question about who is responsible for the OPM hacks, he laid the blame squarely on China. “On the… Keep reading →

Adm. Mike Rogers

GEOINT: NSA Director Adm. Mike Rogers pointedly declined today to confirm whether China was behind the massive Office of Personnel Management hacks. “So what really makes you think that, as the head of NSA and Cyber Com, I’m going to talk with you about this,” he told a reporter here today. Breaking D readers can… Keep reading →

Page 1 of 2012345...20